Patents by Inventor Iven Connary

Iven Connary has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11935288
    Abstract: The systems and methods herein provide improved methodologies for visualization on a user's display of sensor data (e.g., 2D and 3D information obtained from or derived from sensors) for objects, components, or features of interest in a scene. The previously acquired sensor data is processable for concurrent display of objects/features/scene or location visualizations to a user during their real-time navigation of a scene camera during a variety of user visualization activities. Sensor data can be acquired via the operation of vehicles configured with one or more sensors, such as unmanned aerial vehicles, or from other methodologies, or from any other suitable sensor data acquisition activities. Objects etc. for which acquired sensor data can be visualized by a user on a display includes buildings, parts of buildings, and infrastructure elements, among other things.
    Type: Grant
    Filed: January 3, 2022
    Date of Patent: March 19, 2024
    Assignee: Pointivo Inc.
    Inventors: Iven Connary, Guy Ettinger, Habib Fathi, Jacob Garland, Daniel Ciprari
  • Publication number: 20230245393
    Abstract: The disclosure relates to systems and processes for generating verified wireframes corresponding to at least part of a structure or element of interest can be generated from 2D images, 3D representations (e.g., a point cloud), or a combination thereof. The wireframe can include one or more features that correspond to a structural aspect of the structure or element of interest. The verification can comprise projecting or overlaying the generated wireframe over selected 2D images and/or a point cloud that incorporates the one or more features. The wireframe can be adjusted by a user and/or a computer to align the 2D images and/or 3D representations thereto, thereby generating a verified wireframe including at least a portion of the structure or element of interest. The verified wireframes can be used to generate wireframe models, measurement information, reports, construction estimates or the like.
    Type: Application
    Filed: January 12, 2023
    Publication date: August 3, 2023
    Inventors: Habib Fathi, Daniel L. Ciprari, William Wilkins, JR., Iven Connary
  • Patent number: 11557092
    Abstract: Various examples are provided related to systems and processes for generating verified wireframes corresponding to at least part of a structure or element of interest can be generated from 2D images, 3D representations (e.g., a point cloud), or a combination thereof. The wireframe can include one or more features that correspond to a structural aspect of the structure or element of interest. The verification can comprise projecting or overlaying the generated wireframe over selected 2D images and/or a point cloud that incorporates the one or more features. The wireframe can be adjusted by a user and/or a computer to align the 2D images and/or 3D representations thereto, thereby generating a verified wireframe including at least a portion of the structure or element of interest. The verified wireframes can be used to generate wireframe models, measurement information, reports, construction estimates or the like.
    Type: Grant
    Filed: April 23, 2021
    Date of Patent: January 17, 2023
    Assignee: Pointivo, Inc.
    Inventors: Habib Fathi, Daniel L. Ciprari, William Wilkins, Jr., Iven Connary
  • Publication number: 20220130145
    Abstract: The systems and methods herein provide improved methodologies for visualization on a user's display of sensor data (e.g., 2D and 3D information obtained from or derived from sensors) for objects, components, or features of interest in a scene. The previously acquired sensor data is processable for concurrent display of objects/features/scene or location visualizations to a user during their real-time navigation of a scene camera during a variety of user visualization activities. Sensor data can be acquired via the operation of vehicles configured with one or more sensors, such as unmanned aerial vehicles, or from other methodologies, or from any other suitable sensor data acquisition activities. Objects etc. for which acquired sensor data can be visualized by a user on a display includes buildings, parts of buildings, and infrastructure elements, among other things.
    Type: Application
    Filed: January 3, 2022
    Publication date: April 28, 2022
    Inventors: Iven Connary, Guy Ettinger, Habib Fathi, Jacob Garland, Daniel Ciprari
  • Patent number: 11216663
    Abstract: The systems and methods herein provide improved methodologies for visualization on a user's display of sensor data (e.g., 2D and 3D information obtained from or derived from sensors) for objects, components, or features of interest in a scene. The previously acquired sensor data is processable for concurrent display of objects/features/scene or location visualizations to a user during their real-time navigation of a scene camera during a variety of user visualization activities. Sensor data can be acquired via the operation of vehicles configured with one or more sensors, such as unmanned aerial vehicles, or from other methodologies, or from any other suitable sensor data acquisition activities. Objects etc. for which acquired sensor data can be visualized by a user on a display includes buildings, parts of buildings, and infrastructure elements, among other things.
    Type: Grant
    Filed: December 1, 2020
    Date of Patent: January 4, 2022
    Assignee: POINTIVO, INC.
    Inventors: Guy Ettinger, Habib Fathi, Jacob Garland, Daniel Ciprari, Iven Connary
  • Publication number: 20090276852
    Abstract: A method, system, and computer program product for identifying a worm attack on a computer network. The method includes setting a predetermined time period for monitoring non-packet event(s). A log entry associated with the packet event(s) is received and stored. The one or more received log entries identify a first source of a worm infection threat, first destination(s) of the worm infection threat, first timestamp(s) of the worm infection threat, and a non-packet event type of the worm infection threat. A counter is configured for recording, within the predetermined time period, a number of infection attempts of the same event type by the first destination(s) of the worm infection threat to a second destination(s) of the worm infection threat. In response to determining that the number of infection attempts satisfies a defined infection attempt threshold value, an alert confirming the worm attack on the computer network is communicated.
    Type: Application
    Filed: May 1, 2008
    Publication date: November 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jimmy L. Alderson, Iven Connary, Ori Pomerantz, Peter Szczepankiewicz
  • Patent number: 7418733
    Abstract: Network devices such as intrusion detection systems, routers, firewalls, servers, and other network devices are monitored to aggregate all event data generated by monitored devices to provide a threat ranking of all network activity. A threat level for a given host is determined by a threat weighting assigned to that host and a threat weighting assigned to that host's netblock. In addition, a vulnerability for a given event is determined by the event's destination threat associated with a vulnerability value indexed by the event's destination and the event's type.
    Type: Grant
    Filed: August 26, 2003
    Date of Patent: August 26, 2008
    Assignee: International Business Machines Corporation
    Inventors: Iven Connary, Darin J. Buck, Matthew F. Caldwell, Robert T. Hughes
  • Publication number: 20040044912
    Abstract: Network devices such as intrusion detection systems, routers, firewalls, servers, and other network devices are monitored to aggregate all event data generated by monitored devices to provide a threat ranking of all network activity. A threat level for a given host is determined by a threat weighting assigned to that host and a threat weighting assigned to that host's netblock. In addition, a vulnerability for a given event is determined by the event's destination threat associated with a vulnerability value indexed by the event's destination and the event's type.
    Type: Application
    Filed: August 26, 2003
    Publication date: March 4, 2004
    Inventors: Iven Connary, Darin J. Buck, Matthew F. Caldwell, Robert T. Hughes